Perpetuuiti www.ptechnosoft.com
DragonForce
February 05, 2026
To view the source link of intelligence, you need to log in
log in
An initial analysis of the structure and names of the files revealed that the directory contains software source codes, configuration and installation files, backup copies of information systems, database structures and dumps, as well as financial, administrative, operational, and technical documentation related to the functioning of the organization's IT systems. However, the presence or absence of personal data, including contact telephone numbers, cannot be reliably confirmed without additional analysis of the contents of the backups and databases, which indicates a potential area of risk in the context of data protection and information security management requirements. Listing files = 145MB.
Important intelligence

[Report] MFA alone won't save you
Summary:Multi-factor authentication (MFA) has quite rightly become the de facto standard for strengthening access controls. Yet even the best MFA implementations leave a critical gap: weak, reused or compromised passwords. When an attacker bypasses or circumvents MFA (whether by tricking a user into approving a push notification or exploiting a fallback) those same poor passwords become the attacker’s key to your systems.

[RISK] cht.com.tw Faces ATO Risks
Summary:Taiwan's largest telecommunications operator, ChungHwa Telecom, faces the risk of Account Takeover (ATO), with at least tens of thousands of users having been impacted.